четверг, 7 февраля 2013 г.

настройка фаервола centos

Launch the Security Level Configuration tool using the command below.

This section describes how to use the Security Level Configuration text user interface (TUI) tool to configure the firewall.

3. We also need to open the ports for the POP3 and IMAP services. In the Other ports field, add the port numbers below.

2. For a mail server with webmail, check Mail (SMTP), Secure WWW (HTTPS) and WWW (HTTP) in the Trusted services list.

1. Click System, select Administration and click Security Level and Firewall. This will launch the Security Level Configuration window.

This section describes how to use the Security Level Configuration tool to configure the firewall.

Red Hat Enterprise Linux 5 and its derivative CentOS 5 includes a graphical tool called Security Level Configuration for configuring the firewall options. This article describes how to use the Security Level Configuration tool to open up the ports necessary for providing an email server.

Firewall Configuration Howto for RHEL/CentOS 5 РІР‚в„–РІР‚в„– Linux Mail Server Setup and Howto Guide

Комментариев нет:

Отправить комментарий